First published: Wed May 03 2023(Updated: )
NGINX Management Suite default file permissions are set such that an authenticated attacker may be able to modify sensitive files on NGINX Instance Manager and NGINX API Connectivity Manager.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 NGINX Instance Manager | >=2.0.0<=2.8.0 | 2.9.0 |
F5 NGINX Instance Manager | >=1.0.0<=1.0.4 | |
PTC ThingWorx Industrial Connectivity | >=1.0.0<=1.4.1 | 1.5.0 |
F5 NGINX Security Monitoring | >=1.0.0<=1.2.0 | 1.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of F5-K000133233 is classified as critical due to the risk of sensitive file modifications by authenticated attackers.
To fix F5-K000133233, ensure you update to the remedied versions of NGINX Instance Manager, NGINX API Connectivity Manager, and NGINX Security Monitoring as specified in the advisory.
F5-K000133233 affects NGINX Instance Manager versions 1.0.0 to 2.8.0 and NGINX API Connectivity Manager versions 1.0.0 to 1.4.1.
Users of affected versions of NGINX Instance Manager, NGINX API Connectivity Manager, and NGINX Security Monitoring are impacted by F5-K000133233.
F5-K000133233 potentially enables authenticated attackers to modify sensitive configuration files on the affected systems.